Financial transaction processing using a mobile communications device

-

A method for configuring a mobile communication device to perform transactions using a second communication channel that is different from a first communication channel through which the mobile communication device sends voice data. The method includes attaching a secure element to the mobile communication device. The secure element includes a memory storing an application, a processor configured to execute the application stored in the memory; and a wireless transceiver configured to send transaction data associated with the executed application through the second communication channel to a terminal that is remote from the mobile communication device.

Skip to: Description  ·  Claims  ·  References Cited  · Patent History  ·  Patent History
Description
CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of application Ser. No. 11/933,321, filed Oct. 31, 2007, which is a continuation-in-part of application Ser. No. 11/467,441, filed Aug. 25, 2006, now abandoned, which claims priority to U.S. Provisional Patent Application No. 60/766,171 and U.S. Provisional Patent Application No. 60/766,172, both filed on Dec. 31, 2005, all of which are incorporated by reference herein in their entireties.

FIELD OF INVENTION

The present invention relates to data communications and wireless devices.

BACKGROUND OF THE INVENTION

Online transactions—e.g., for purchasing goods, receiving downloads, and so on—which involve personal computers and the Internet are well known. Further, wireless mobile communication devices, such as cell phones, blackberries or other personal digital assistants, are also being used for making transactions. For example, U.S. Patent Application No. U.S./2003/0172028 provides a description of a personal payment system that utilizes a wireless enabled device such as a cell phone. As described, the personal payment system interacts using a Bluetooth protocol with a terminal located nearby the wireless enabled device. In another example, U.S. Pat. No. 7,031,945 describes a system and method that provides an electronic ticket to a smart card or standard wireless device that is identified with a user's account.

Further, wireless mobile devices that include a near field communication (NFC) device and a smart card (that uses an RFID for identification purposes) allow a person to securely make a simple transaction, such as for example, purchasing a bus ticket. In such an example, the person typically waves the wireless mobile device near a reader installed in a bus, and a price of the bus ticket is deducted from a total amount that is available and stored on the smart card of the wireless mobile device. Optionally, the amount of the bus ticket can be forwarded to a server that can identify the identification code of the particular RFID and then subsequently charge the person for the purchase of the bus ticket.

While the references discussed above illustrate that certain transactions are possible using wireless mobile devices, one problem associated with the references are is that implementations described in the references are not useful in a wide variety of different platforms, but rather are typically tied to a specific platform. For example, NFC devices are only usable with NFC readers. Another problem is that conventional wireless mobile devices generally have a very limited ability to be used in transactions.

BRIEF SUMMARY OF THE INVENTION

In general, in one aspect, this specification describes a method and system for configuring a mobile communication device to perform transactions using a second communication channel that is different from a first communication channel through which the mobile communication device sends voice data. The method includes attaching a secure element to the mobile communication device. The secure element includes a memory storing an application, a processor configured to execute the application stored in the memory; and a wireless transceiver configured to send transaction data associated with the executed application through the second communication channel to a terminal that is remote from the mobile communication device.

The details of one or more implementations are set forth in the accompanying drawings and the description below. Other features and advantages will be apparent from the description and drawings, and from the claims.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates one implementation of a block diagram of a communication system including a wireless mobile communication device.

FIG. 2 illustrates one implementation of radio element in the wireless mobile communication device of FIG. 1.

FIG. 3 illustrates one implementation of a wireless mobile communication device.

FIGS. 4A-4C respectively illustrate an implementation of a secure element in the wireless mobile communication device of FIG. 1.

FIG. 5 illustrates one implementation of a point of sale terminal.

FIGS. 6A-6D illustrate a flowchart for conducting a transaction according to one implementation.

FIG. 7 illustrates one implementation of a secure element that is attachable to a wireless communication device.

FIG. 8 illustrates a communication system in accordance with one implementation.

FIG. 9 illustrates a communication system in accordance with one implementation.

FIGS. 10A-10B illustrate example client user interfaces that are displayable on a display of the mobile communication device of FIG. 9.

Like reference symbols in the various drawings indicate like elements.

DETAILED DESCRIPTION OF THE INVENTION

This disclosure describes a communication system and method for assisting a user to complete a transaction. FIG. 1 illustrates one implementation of a communication system 100. The communication system 100 includes a hand-held, wireless mobile communication device 110 that (in one implementation) includes a radio element 120 and a secure element 130. A display 124 is shown associated with the radio element 120, and antennas (not labeled) are shown as associated with each of the radio element 120 and the secure element 130. Each antenna can physically be implemented in a manner that is different from the wireless antennas shown in FIG. 1. For example, an antenna can comprise a stripe that is passed along a reader, or comprise some suitable transmission mechanism. Although elements 120 and 130 are shown as distinct and separate, and display 124 is shown as connected to the radio element 120, other configurations are possible. In particular, a combination in which a single processor is used to execute the functions that are currently performed and described herein as being provided by both the radio element 120 and the secure element 130. Further as illustrated in FIG. 1, both the radio element 120 and the secure element 130 are internal to the mobile communication device 110, although in other implementations the secure element 130 can be external to the mobile communication device 110, as described below. Also, various different functionalities can be included within the radio element 120 and the secure element 130.

In one implementation, the mobile communication device 110 has the functionality to communicate with one of many different a point of sale (POS) terminals 150-1 to 150-n—e.g., in a contactless manner using a wireless protocol. The mobile communication device 110 can also similarly communicate with one or more point of entry (POE) terminals 190-1 to 190-n. The point-of-sale terminal 150 receives one of the transaction request signals from the mobile communication device 110 and transmits the one transaction request signal to a transaction server 170, typically using a communication channel 160 such as the Internet. The transaction server 170 verifies the transaction, and forwards a transaction verification signal to the management server 180. The management server 180 identifies the user corresponding to the transaction verification signal, and provides a first transaction response signal back to the mobile communication device 110 as one of the transaction signals.

In one implementation, the first transaction response signal is communicated back to the mobile communication device 110 using a communication channel that is different from the communication channel used to initiate the transaction. In one implementation, different transaction response signals can be communicated back to the mobile communication device 110 using communication channels from the management server 180 to the radio element 120 associated with the device 110, as well as from the management server 180 to the secure element 130 through the POS terminal 150 or the POE terminal 190. Further detailed descriptions of these implementations are discussed in greater detail below.

FIG. 2 illustrates one implementation of the radio element 120 associated with the mobile communication device 110, and illustrates the radio element 120 connected to the display 124 of the mobile communication device 110. In one implementation, the radio element 120 includes a radio transceiver 122 that is adapted to send outgoing voice and data signals and receive incoming voice and data signals over a radio communication channel. The radio communication channel can be a digital radio communication channel, such as CDMA or GSM. Such a radio communication channel has the capacity to communicate both voice and data messages using conventional techniques. The radio transceiver 122 communicates with a radio processor 123, which processor has the capability to perform not only the radio communication services necessary to allow for phone and data communications, but can also execute various programs that are stored in the memory 126, which programs can receive inputs from the user via the display 124 and/or a keypad 125 associated with the mobile communication device 110.

In one implementation, application programs running on the radio processor 123 are, e.g., BREW or J2ME applications and can encompass a broad array of application types. For example, current applications include games, enterprise applications, and multimedia applications. In one implementation, the radio processor 123 runs an application that provides movie and event information. Such an application can comprise ticketing applications, content, item and service purchase applications, and/or payment management applications (referred to herein also as “wallet applications”). In one implementation, the radio processor 123 also has the capability of recognizing secure communications, and transmits data which must be stored in a secure environment to the secure element driver 128 for transmission to the secure element 130. In one implementation, in which both the radio element 120 and the secure element 130 are internal to the mobile communication device 110, transmissions to the secure element 130 can take place using an internal wired communication channel. In one implementation, the radio processor 123 also has the capability of receiving data from the secure element 130, e.g., using the internal wired communication channel. In one implementation, the secure element 130 and the radio element 120 communicate using signals described in the Java Card 2.1 Platform API Specification.

In one implementation, both the radio element 120 and the secure element 130 are disposed internally within a body of the mobile communication device 110. For example, referring to FIG. 3, the mobile communication device 110 is shown including a slot 400, which allows for the insertion of a secure element 130 into the slot 400. In this configuration, the secure element 130 can be purchased independently of the mobile communication device 110. The secure element 130 can also be disposed into a slot that only provides for physical insertion and mechanical connection to the body of the mobile communication device 110. In such an implementation, the secure element can include a transceiver that allows for the communication with the radio element 130 through a wireless local communication channel. The radio element 120 also is illustrated as optionally including another transceiver 129, such as a Bluetooth or WIFI transceiver, which can transmit and receive signals with an external device and then communicate signals to and from the radio processor 123. This additional communication channel allows for communications between other external devices, such as an external Bluetooth enabled smartcard, and provides an additional communication channel that is useful for certain transactions, as described further herein.

FIG. 4A illustrates one implementation of the secure element 130 associated with the mobile communication device 110. The secure element 130 can be a smart card. In one implementation, the secure element 130 includes a secure processor 132, a secure memory 133, and a POS transceiver 134 adapted to send transaction request signals and receive transaction response signals over a first communication channel. In one implementation, the secure processor 132 communicates via the secure element driver 128 with the radio processor 123 using signals as described in the Java Card 2.1 Platform API Specification. The transaction request signals and the transaction response signals associated with the transaction can include an identification code associated with the user, as well as information relative to the transaction, such as item, quantity, vendor, and so on. In one implementation, the POS transceiver 134 is an NFC device, which uses an NFC modem. The POS transceiver 134 can also be a Bluetooth, WIFI or other transceiver. In an implementation in which the POS transceiver is an NFC modem, such an NFC modem will typically have a set of registers that can be read/written by the secure processor 132. These registers are in turn available for reading and writing over the RFID communications channel and serve as a shared memory between the secure processor 123 within the secure element 130 and the RFID reader that is associated with the POS terminal 150. This communication is specified, for example, in the ISO 14443A/B standard. The secure element can optionally include a radio/Bluetooth/WIFI transceiver 136, which can communicate with other devices, such as a transceiver associated with the radio processor 120 or for other external devices having those communication capabilities, thus allowing for more flexibility.

FIG. 4B shows another implementation of a secure element 130, in which the radio element 120 does not communicate with the secure element 130 through a secure element driver 128. In this case, for example, the secure element 130 may be external to the mobile communication device 110 and as such is not connected to the radio element through the secure element driver 128. In such an implementation, however, if the transceiver 136 as described above is included, and a similar transceiver 129 associated with the radio element 130 as described previously with respect to FIG. 2 is included, then this communication channel can be used to wirelessly obtain direct communications between the radio element 120 and the secure element 130. This implementation allows for certain bidirectional communications with other devices, as well as with the radio element 120, and as such more functionality and flexibility is achieved. This implementation is particularly useful since it establishes a direct local communication path with the radio element 120, since there is not communications with the radio element 120 via the path of driver 128.

This implementation allows for certain bidirectional communications with other devices, as well as with the radio element 120, and as such more functionality and flexibility is achieved. This implementation is particularly useful for establishing a direct local communication path with the radio element 120, since there are no communications with the radio element 120 via the path of driver 128. If either of the transceivers 129 or 136 are not associated with the respective radio element 120 or secure element 130, and there is no direct connection between the radio element 120 and the secure element 130, then a direct communication link between the radio element 120 an the secure element 130 will not exist. As such, while ticketing and many transactions can still exist, data from a real-time transaction performed using the secure element 130 cannot be made directly available to the radio processor and the applications stored thereon. In such an implementation, certain redundancy checks may not occur. For example, a ticketing application can be programmed to provide an alert if a ticket receipt has not been received within a certain period of time. Such an alert would not be possible to program directly (although it could be programmed indirectly via the button panel on the phone).

FIG. 7 illustrates one implementation of a secure element 130 that can be attached (or affixed) externally to a wireless communication device (e.g., mobile communication device 110). In one implementation, the secure element 130 has circular shape. The secure element 130 can have other suitable shapes—e.g., rectangular, triangular, and so on. In one implementation, the secure element 130 includes an embedded smart chip 702 that is capable of executing proximity services (e.g., services related to payments, ticketing, identification, sending coupons, etc.). In one implementation, the smart chip 702 is capable of 2-way wireless communication (e.g., RFID, NFC, Bluetooth, etc.) with a supporting 3rdParty terminal. In one implementation, the 2-way communication is performed using a communication protocol that is different from a communication protocol through which the mobile communication device sends or receives voice and/or data signals. Multiple application protocols (NFC, MiFare, etc.) can be supported. In one implementation, the smart chip 702 is programmable. Accordingly, different application (for payments, ticketing, identification, coupons, etc.) can be developed, downloaded to the smart chip, and commissioned. Thus in operation, in response to the secure element 130 being placed in close proximity with a suitable terminal, the terminal will trigger (via application protocol) an appropriate application stored in the smart chip, and the smart chip will respond appropriately with the terminal.

In one implementation, the smart chip uses a low-power RF transmitter/receiver to communicate with a terminal. The low-power output of the smart chip makes it susceptible to RF interference from neighboring devices. Specifically problematic are components associated with the mobile communication device, e.g., battery, antennae (internal or external), to which the secure element 130 is affixed. Thus, in one implementation, the secure element 130 includes an RF shield to insulate the smart chip from external interference. In one implementation, a lining of the secure element 130 is composed of an RF absorbent material/lining. In general, each phone has different levels of interference, and a material, size and thickness of the RF lining can determine an effectiveness of the RF shield. In one implementation, an RF shield can be placed between the secure element 130 and the mobile communication device 110.

Given the abuse a mobile communication device can take, components that are affixed externally to a mobile communication device need to be able to withstand some abuse. Thus, in one implementation, the secure element includes a ruggedized shell 704 that encases a smart chip (with antennae). In one implementation, the shell 704 is formed from a composite plastic or polymer. The shell 70 can be hard (and substantially inflexible) or be soft (and pliable). In one implementation, the shell 704 provides a protective membrane for the smart chip which prevents damage to internal circuitry, a surface to adhere to an RF lining and/or a mobile communication device with appropriate adhesive, and a surface to print branding and advertising. Types of adhesives that can be used to affix the secure element 130 to a mobile communication device include, for example, paper glue, super glue, polymers, and the like. In one implementation, the shell 704 has a maximum width (or diameter) of 25 mm, and has a maximum thickness (or depth) of 5 mm.

FIG. 4C shows another implementation of a secure element 130, in which the secure element 130 does not include a processor that is capable of bidirectional communications, but instead includes a passive device 138. The passive device 138 can be an RFID sticker or suitable tag that allows for uniquely identifying a user, such that a transaction that is initiated with the passive device 138 will cause the management server 180 to perform transaction details. In this implementation, the code received from the POS terminal 150 (or the POE terminal 190) is transmitted from the POS terminal 150 (or the POE terminal 190) to the management server 190, which then takes over the transaction. This passive device 138, with the identification code stored thereon, can thus be associated with a mobile communication device 110 not otherwise equipped for such communications, and the management server 190 can provide transactional information to the mobile communication device 110 using available channels on the mobile communication device (such as audio, SMS, or other known data transmission methods). While bidirectional communications do not occur with other devices, transactions are possible, because the management server 190 is involved.

SMS (Short Messaging Service) As A Data Transmission Method

As discussed above SMS (Short Message Service) can be used as a data transmission method between the management server 190 and the mobile communication device 110. SMS is generally unstructured. Thus, when messages arrive in an inbox of a user inbox, the user cannot easily search, retrieve, or organize the messages. In addition, due to SMS's send-and-forget characteristics, it cannot be assumed that messages are received by the terminating point, or if received, received in a particular sequence. FIG. 8 illustrates a communication system 800 in accordance with one implementation. The communication system 800 includes a mobile communication device 802 that communicates with a remote server 804 (e.g., a transaction server) via SMS. The mobile communication device 802 includes a mobile application 806 that receives SMS messages from the remote server 804 and organizes the SMS messages (including linking corresponding messages into a pre-determined order) so that data can be stored and displayed to a user in an organized and easily retrievable fashion, unlike a conventional application that implements SMS as a data transmission method in which SMS messages remain in an unstructured format and are unlinked. Such an unstructured format does not allow the user to retrieve, organize, or manage the display of messages. The mobile application 806 can be, for example, a J2ME, BREW, Windows Mobile, or other type of application.

In one implementation, the mobile application 806 is a rich client application (also commonly referred to as a fat client application or thick client application). A rich client application is a client application that performs the bulk of any data processing operations itself, and does not necessarily rely on a server (e.g., remote server 804). The mobile application 806 can also be a thin client application or hybrid client application. In one implementation, the mobile application 806 is the Blaze Mobile Wallet Lite application available from Mobile Candy Dish Inc. or Berkeley, Calif. In one implementation, the mobile application 806 provides banking and money management transaction services, and transmits data from the wireless communication device 802 via SMS in accordance with a connectionless protocol.

FIG. 9 illustrates a communication system 900 in accordance with one implementation. The communication system 900 includes a mobile communication device 902, a management server 904, a user/profile database 906, and a money management database 908. In one implementation, the management server 904 is a Blaze server. In one implementation, the mobile communication device 902 stores a mobile application 910 that uses short message service (SMS) over a connectionless protocol to transmit data to the management server 904. SMS permits the mobile application 910 to send messages of a fixed size, for example, up to 160 characters, to and from the wireless mobile communication device 902. In one implementation, the management server 904 includes an SMS aggregator 912 to aggregate each message received from the wireless mobile communication device 902 and keep track of the ordering of each message, and (in one implementation) also groups each message into a corresponding group. In one implementation, the mobile application 910 also includes an SMS aggregator (not shown).

Thus, in one implementation, the mobile application 910 is not browser HTTP based, and delivers banking and money management services. The mobile application 910 also leverages a low-end communication infrastructure (also referred to herein as a “bearer service”). A bearer service that is universal on all mobile devices is the Short Message Service (SMS). SMS is a means of sending short messages to and from mobile phones to the Application Service Provider (ASP) Server “Server”. It is inherently a connectionless communication protocol, i.e., send and forget. There is no acknowledgement to the Mobile Originating (MO) sender that the message sent was successfully received by the Mobile Terminating (MT) recipient. There is no concept of timeouts, message lost, message not received, etc. Leveraging SMS as a bearer service to support a ‘rich’ client application. The Client will listen to a specific incoming SMS port to be defined based on Network Operator/Carrier, Phone Vendor, etc.

In one implementation, the mobile application 910 provides banking and money management service, which includes (but is not limited to):

    • Registration: User creates new MW Lite account with PIN (PIN and user info can be stored in user/profile database 306)
    • Security & Encryption: Sensitive information may optionally by encrypted using 3rdParty or native phone tools (Bouncy Castle, etc.). Encryption (Public/Private) keys may be managed or proxy'd by Server which may additionally be out-sourced to 3rdparty Key Management vendor.
    • Install & Configuration (I&C): Refers to setting up proxies to
      • payment accounts (virtual, credit, debit & banking)
      • Payees (BillPay, PayAnyone, etc.) and associated rules
      • Specify default payment account to debit fund transfers/unloading
      • Specify default payment account to credit fund transfers/loading
      • Activation of 3rdParty Services (Account Balance, Bill Pay, Fund Transfer, Funds Loading, Funds Unloading)
      • It is assumed Client application is pre-installed or downloaded to mobile device.
      • I&C to be performed via Kiosk, ATM, 3rdParty/Carrier Web Portal, MCD Web Portal, on mobile device, or other suitable device.
    • Loading Funds
    • Banking or financial data
      • Account balance
      • Transaction history
      • Bill Pay—Biller Direct
      • Fund Transfer—Intra Bank; Me-2-Me
      • Fund Transfer—Inter Bank; Me-2-Me
      • Fund Transfer—Inter Bank; Me-2-You (based on Bank Routing/Account #)
      • Fund Transfer—Inter Bank; Me-2-You (based on WalletID)
      • Fund Transfer—Inter Bank; Me-2-You (based on ACH Check). A.k.a. Bill Pay Anyone
      • Load Fund
    • Unload Funds (ATM Withdrawal, etc.)
    • Sync: Ensures server-side objects are downloaded to client and locally cached. This includes payment accounts, payees, payment rules, server-side cached account info (account balance, Last-N transaction history), etc.
      • This info will be cached on Client.
      • Users can create transaction either in ONLINE or OFFLINE (no network connectivity) mode
    • Initiating/Triggering Banking Services:
    • Storage: Storage of Users MWLite info, User's payment account info (credentials, account balance, history, etc.); Banking Payment History (BillPay, Fund Transfer, Fund Loads, Fund Unloads, etc.)
      Scenarios/Features

1. Overlaying connection protocol properties over SMS. This includes: segmenting complex command and control (C&C) messages into 1 or more SMS messages, and re-constructing one or more SMS messages into complex C&C resultset messages. Re-constructing the one or more messages into complex C&C resultset messages can include one or more of the following providing acknowledgement, handling out-of-sequence incoming messages, handling unexpected messages or messages considered lost (due to timeout, etc.), Managing encryption as needed, and so on.

2. User uses the mobile application 910 to initiate/trigger appropriate banking service. For example, referring to FIG. 10A a user can initiate a bill paying service through which a payee (e.g., PG&E) can be paid. In one implementation, the display of the bill pay screen can include an advertisement as shown in FIG. 10A.

3. The mobile application 910 formulates appropriate banking services commands, for example:

    • “<command><PaymentAccount> <Payee> <$amt> <transferDate> <PIN> <sequenceID> <message> <messages>”
      • billpay MCC-2345 PG&E 110.23 20070328 1234 36 1 1
      • transfer bofa-1007 jdoe 25.00 20070328 1234 36 1 1 #where jdoe is a walletID
      • transfer bofa-1007 8005550001 25.00 20070328 1234 36 1 1 #where 8005550001 is the phoneNumber of unloading station.
      • fundstransfer bofa-1007 gwbush 30.00 20070328 1234 36 1 1 #gwbush is a payee
    • “<command> <PaymentAccount> <PIN> <sequenceID> <message> <messages>”
      • Balance bofa-1007 1234 36 1 1

4. A Loading Station (Kiosk, etc.) can load funds by sending command to MCD's Loading Shortcode.

    • “<command> <PaymentAccount> <Payee> <$amt> <transferDate> <PIN> <sequenceID> <message> <messages>”
      • load CorpBankPayrollAccount-2007 8005550001 4000.00 20070328 0987 43 1 1 (#Debit account CorpBankPayrollAccount-2007 by $4000 and credit account held by user with phone Number 8005550001)

5. Receive multiple (in/out sequence, missing, lost, etc.) messages to reconstruct a complex messages.

    • <sequenceID>:<message>:<messages>; <body>
      • “36:1:6; acct:Bofa-1007 bal:40123.32 date:20071009”
      • “36:3:6; date:20071009 name:Merchant2 amt:123.81”
      • “36:6:6; date:20071009 name:Merchant5 amt:423.81”
      • “36:4:6; date:20071009 name:Merchant3 amt:223.81”
      • “36:2:6; date:20071009 name:Merchant1 amt:23.81”
      • “36:5:6; date:20071009 name:Merchant4 amt:323.81”

In one implementation, post processing of these multiple messages results in the screen shown in FIG. 10B which displays the account balance and the last five transactions in a transaction history list. The list can be cached on the mobile communication device 902 for later use.

6. Cashed data is refreshed upon user request. This in turn invokes a command similar to the following:

    • <command> <account> <PIN> <sequenceID> <message> <messages>
      • Balance Bofa-1007 1234 37 1 1 (#Where 37 is the next <sequenceID>)
        Connection Protocol Properties

The above description introduced the concept on <sequenceID> <message> <messages>. The sequenceID is a rotating pool per Client, issued by the Client, used as a callback mechanism, i.e., match outgoing command messages and incoming resultset messages. Since resultsets can be long and complex, the resultset is broken into pages, where each page can fit with the allowed payload size of an SMS message. Hence, “<message> <messages>” implies “Page 1 of 5”. The Client (or mobile application) then has to wait for all <messages> to arrive before re-constructing the original resultset. Due to characteristics of SMS, the client has to handle scenarios when a message with an un-expected sequenceID arrives. In addition, if a missing page within the expected sequenceID fails to arrive within a specified time interval, the client needs to request retransmission, e.g., “retransmit 36:4:6 1234” which will instruct server to retransmit resultset 36, part 4 of 6.

The pool size (or range of valid sequenceID's) controls the asynchronous aspect of the application. The sequenceID is mapped to the command (at least until the sequenceID is re-used). Hence, the client will use the sequenceID to determine to command and associate the appropriate display style sheet to best display the resultset to the user. For example, if sequenceID=36 was issued by the command ‘balance’ which determines account balance, it makes sense to leverage the ‘Account Balance & History’ style sheet to present this information.

SMS messages to and from the mobile communication device has to be acknowledged. A simple protocol is necessary, for example, as follows:

    • 1. #Mobile Originated (MO) command
      • <command> <body> <sequenceID> <message> <messages> balance Bofa-1007 1234 37 1 1
    • 2. #Server, a.k.a., Mobile Terminating (MT) receives and acknowledges receipt of message “37 part 1 of 1.”
      • ack 37 1 1
    • 3. #MT responds with resultset
      • 36:1:2; acct:Bofa-1007 bal:40123.32 date:20071009
    • 4. #MO receives and acknowledges receipt of message “36 part 1 of 2.”
      • ack 37 1 2
    • 5. #MT responds with resultset (part 2 of 2)
      • “36:2:2; date:20071009 name:Merchant1 amt:23.81”
    • 6. #MO receives and acknowledges receipt of message “36 part 2 of 2.”
      • ack 37 2 2
    • 7. #MO has received all messages. Reconstruct & store message
    • 8. #Next time user view account balance, display cached (local store) information:
      • Bank Account: Bofa-1007
      • Balance: $40,123.32 as of 10/9/2007
      • 10/9/2007 Merchant1 $23.81
        Online/Offline Access

In one implementation, a mobile communication device creates task/objects either while connected with a Server (online-mode) or when no connection is available (offline-mode). Tasks/objects are specific to mobile banking service and include for example: schedule (or cancel) a fund transfer transaction, schedule (or cancel) a bill pay transaction, and manage other banking transactions. In addition, digital artifacts (coupons, tickets, etc.) that possess a state (or status) (e.g., Assigned, Saves, Redeemed, Deleted, etc.) can undergo changes on the mobile communication device. Given these tasks/objects associated to Banking Services and Digital Artifacts has ‘states’ that can be changed in either an online-mode or offline-mode, the Server has to be refreshed/updated either in real-time (online-mode) or in batch (offline-mode).

For example, given a situation in which a user is travelling in a region in which the user's mobile communication device does not have network access and the user needs to transfer funds into a checking account, the user can use the mobile communication device (with the Mobile Wallet Client application) to schedules a fund transfer in offline mode. Since the mobile communication device has no network connectivity, the Client (in OFFLINE mode) creates a ‘task’ to represent the fund transfer (or any other banking service) using banking information (Banks accounts, etc.) previously cached on mobile device. The task can have an initial state (e.g., “pending”). While the Client is enabled the Client will actively monitor network access. When the user travels into a region where network access is available, the client will identify the network and automatically re-connect to the network. The client will then negotiate with a server and any tasks having a “pending” state on the client are then uploaded to server (either in batch mode or one task at a time). The client (in ONLINE mode) will refresh states of all task from the server (including the recently added tasks) to present to the user the updated status of all tasks managed by the server. Other services possible include, for example: request schedule (or cancellation) of Bill Pay transaction, request schedule (or cancellation) of Fund Transfer transaction, request schedule (or cancellation) of Pay Anyone transaction, any other state-based banking transaction service.

Using the client (or mobile application), a user can store digital artifacts (e.g., coupons, tickets, etc.) on a mobile communication device. These digital artifacts are objects that are consumed by a 3rdParty, e.g., a ticket can be redeemed at a theater, and a coupon can be redeemed at the Point-Of-Sale of a retail merchant. Hence, this is a 3-way sync: 1) mobile communication device with server, 2. mobile communication device with 3rdParty Merchant, and 3) server with 3rdParty Merchant. For user's convenience, redemption of digital artifacts by a 3rdParty must be enabled in an environment with or without network access. For example, a user with an electronic ticket on a mobile communication device may wish to redeem an eTicket at a theater. However, if there is no network access inside the theater, the user will still need access the eTicket on the client. In ONLINE mode, the client will cache (local store) the eTicket (and any other digital artifact.) In the theater, the client (in OFFLINE mode) will be able to redeem the eTicket and update the state of the eTicket on the mobile communication device (e.g., change state from ‘valid’ to ‘redeemed’). This prevents the user from re-using the eTicket. At some point when the mobile communication device re-acquires network connectivity, the client will then negotiate with the server and any artifacts with a state change (e.g., ‘valid’ to ‘redeemed’, etc.) on the client are then uploaded to the server (e.g., either in batch mode or one task at a time).

The client (in ONLINE mode) will manage and refresh states of all artifacts from the server (including the recently added tasks) to present to the user. In one implementation, the server is the master repository. In the process of redeeming the eTicket, the eTicket is uploaded to the merchant (via secondary out-of-band communication link, e.g., RFID/NFC, Bluetooth, etc.). This is necessary for theater to update their inventory systems. The 3rdParty may liaise (via an internet connection) with the server to validate eTicket and authenticate the user.

POS (Point of Sale) Terminal

The point of sale terminal 150 illustrated in FIG. 5 is conventional, in that it has the capability of electronically reading information from a device equipped to transmit information in a format that it reads. Thus, the reader 152 within the point of sale terminal 150 can be of one or many types. If the point of sale terminal reader 152 includes the provision for NFC communications, then simply bringing the secure element 130 with the NFC transceiver will cause initiation of a transaction and the transmission of the identification code associated with the secure element 130 and thus the user.

In one implementation, various software that is downloaded into the memory 126 of the radio element 120 and the secure memory 132 of the secure element 130, along with software resident on the management server 180, cooperate at a layer that is above the physical layer of the communications, in order for the desired transaction to occur. This software is implemented using based upon known knowledge of mobile communication device 110 internals and application platforms, NFC, smartcard internals and application platforms, payment protocols (e.g. PayPass), and the working/workflow associated with POS and POE terminals, and the transaction and management servers. In addition, the present invention provides for piggybacking a tunneling protocol on top of the payment protocol, so that the secure elements 130 can communicate with the transaction server 170 and/or the management server 180, without modification to the POS terminal 150 or the POE terminal 190. As such, this includes software within the secure element 130 that embeds the required information in fields which will not adversely affect the performance of the POS terminal 150 and/or the POE terminal 190, and also software in transaction server 170 that will extract the piggybacked payload, associate the payload with the management server 180 if needed, and then authenticate, authorize, and execute transfers of transaction information to the management server 180. In one implementation, the piggybacked payload is sent, instead of to the transaction server 170, to the management server 180, which can then associate the transaction and notify the transaction server 170, the POS terminal 150 and/or the POE terminal as needed.

In one implementation, the management server 180 has the capability of storing codes that are from a variety of different mobile communication devices. Thus, codes that are associated with a smart card having an RFID can be stored, as can be codes stored from an RFID sticker, as well as codes that are associated with a smart card that communicates using a slide reader, Bluetooth, or an NFC channel, for example. As such, the management server 180 can store user personal and credit and transactional information and history, including a code associated with the user, for a variety of different mobile communication devices, thereby allowing a system which can scale.

FIGS. 6A-6D illustrate a flowchart of a transaction in accordance with one implementation, and the various steps that are included in the transaction, with reference to which of the various devices are implementing this step. Referring to FIG. 6A, a user first waves a mobile communication device 530 (e.g., a NFC device or device having an attached sticker) across (or near) a POS terminal 540. The POS terminal 540 identifies the technology associated with the mobile communication device, a payment method, user credentials, and payment credentials. Irrespective if t mobile communication device is a NFC-Phone or includes an attached sticker, the mobile communication device sends to the POS Terminal 540 payment credentials including optional credentials (e.g., WalletID). As shown in FIG. 6B, using optional credentials (e.g., WalletID), contact is made with a transaction server 510 to request payment credentials. The POS terminal 540 determines if a security code prompt (e.g., a PIN) is needed? If yes, a prompt is made for the security code (PIN) on the POS terminal 540 and the process continues with processing of the payment. Otherwise, the POS terminal 540 simply proceeds with processing of the payment. As an alternative, the POS terminal 540 can integrate via the back office to a management server 510 and trigger a PIN prompt on the mobile communication device. In such a case, the user can enter the PIN on the mobile communication device (instead of through the POS terminal 540). The POS terminal 540 hands processing to a payment broker.

Referring to FIG. 6C, assuming the POS terminal 540 was capable of 2-way communication, if the POS terminal 540 determines that the mobile communication device is a NFC Phone, the POS terminal 540 can write digital artifacts (e.g, eReceipts, eTickets, eCoupons, etc.) to the mobile communication device. Non-secure data is stored in the mobile communication device. Otherwise, the POS terminal 540 sends optional digital artifacts to the management server 510. As part of an out-of-band sync between the management server 510 and the mobile communication device, the non-secure digital artifacts are downloaded and stored in the mobile communication device. Secure digital artifacts are downloaded to the mobile communication device and stored on a secure element of the mobile communication device (if possible).

In FIG. 6D, upon successful payment processing and assuming the POS terminal 540 was capable of 2-way communication, if the POS terminal 540 determines that the mobile communication device is not an NFC Phone, the POS terminal 540 triggers the management server 510 of payment processing completion. Note, this can be time delayed due to a difference when a payment is posted and cleared. The management server 510 can send a notification to the mobile communication device (via SMS, etc.). Since the mobile communication device could be shutdown, the notification will wake-up the mobile application running on the mobile communication device, and initiate SYNC operations between the management server 510 and the mobile application (or client). Any pending digital artifacts (including notifications, etc.) are displayed on the mobile communication device.

The present invention, as described previously, allows for various different programs to exist within the memory 126 of the radio element 120, as well as in the secure memory 132 of the secure element 130.

Mobile Tickets (eTickets)

In one implementation, a mobile ticket (also referred to herein as “electronic ticket” or “eTicket”) includes both a unique code that is sent to the consumer's cell phone and a database that allows for the validation of the consumer using their cell phone number and the unique code. The mobile ticket can be used at kiosks in addition to interfacing with a ticket agent. The mobile ticket may be used with or without cell phones equipped with radio technology (i.e., RFID or NFC). In operation, a mobile ticket works when the user is sent a unique code (alpha-numeric, numeric, etc.) to their cell phone. The user is validated as a customer by their cell phone number and their code. If these match the information stored in a central database, the user is allowed admission into a venue by either manual validation by a ticket agent or automatically using RFID or NFC technology.

In general, an electronic ticket can be delivered to a mobile device and allow a consumer admission into a sports venue, entertainment venue (e.g. concert or movies), or other point of sale location either manually if the consumer displays the electronic ticket to an agent who may issue a paper ticket to the consumer or automatically if the consumer waves their cell phone (if equipped with a radio transmitter) over a POS device which contains a radio receiver. In one implementation, an electronic ticket (or tickets) is selected by viewing an image of the venue seating map. The seating map can be rendered on the mobile device. Users can zoom in/out of the seating map. As User zooms in, additional layers (details, info, etc.) is presented. For example, a user can view Venue→Quadrant→Level→Section→Row. The ability to zoom in/out and present additional levels of details can be processed either on the mobile device (Client) or on the Content Server, the end result is an updated image rendered on the mobile device. In one implementation, seats are color coded to represent availability and price. In this manner, seat inventory (what's available and at what price) can be illustrated graphically. Once user has navigated to lowest level, the image is granular enough to select individual seats. In one implementation, a seat selection will automatically cause a price to be calculated. Any service fee can be included in the ticket price. Once user confirms purchase, reservation request is sent to ticket inventory system. If reservation is successful, a valid electronic ticket is returned to the mobile device.

The present invention can also be interfaced with certain known and implanted payment protocols, such as Paypass. For implementing these additional payment protocols, implementation of streaming communication protocols (in the full NFC case), protocols for session setup, and configuration of communications modules and secure data areas as needed is necessary, taking into account the communication protocol used (e.g. NFC, Bluetooth, WIFI, CDMA, 3.sup.rd Generation CDMA for example) as well as file transfer protocols and facilities access protocols. In particular, in implementing such protocols, the ability to extract transaction information from the POS terminal 150 to the secure element 130 can be provided during the course of the local interaction between the POS terminal 150 and the secure element 130. For instance, the implementation of PayPass within the invention will take note, and alert the application running on the radio processor 123 that a purchase or purchase attempt has occurred, as noted above in the context of the alert discussion. In one implementation, a feature is provided that permits information passed via the PayPass protocol to the POS terminal 150 (and thence to the transaction server 170) to be augmented with additional fields containing the elements of the tunneling protocol, for subsequent processing by the transaction server 170, either directly, or through the management server 180.

The two transaction workflows that have been specifically discussed above are the credit card and ticketing workflows. Other transaction flows can also be implemented. Debit card and cash card transactions are similar to credit card transactions, with variations being implemented to account for the differences that exist in those types of transactions, which types of transactions are well understood. Coupons can be implemented with the invention, in much the same manner as tickets, though coupons can be transmitted without there being payment. Many of the transaction types noted herein will, as is apparent, require communication between the secure element 130 and the radio element 120. As such, due to that requirement, a significant part of the preceding discussion has been directed to how to implement that communication, particularly for mobile communication devices 110 that are not manufactured to allow for such communications.

An example of a typical transaction requiring such communication between the secure element 130 and the radio element 120 is one in which the POS terminal 150 allows for the transfer of detailed purchase information from the POS terminal 150 to the secure element 130, as well as transactional information from the POS terminal 150 and/or the transaction server 170 to the management server 180. The management server 180 can then also communicate with the radio element 120 via the radio channel. This allows for the matching and reconciliation of detailed purchase information and, if the transaction fails, failure details can be matched to the purchase information, and forwarded in real-time to the user via the radio element 120. In one implementation, there is included the provision for different phones to communicate the results of a transaction, particularly using the POS transceiver or one of the Bluetooth/Wifi transceivers. In this implementation, after a transaction has been completed with one of the mobile communication devices 110a, another mobile communication device 110b can receive information regarding the transaction completed. Thus, for instance, if mobile communication device 110a purchases two tickets, one of the tickets can be transmitted to the mobile communication device 110b by each using a POS transceiver or one of the Bluetooth/Wifi transceivers.

Although the present invention has been particularly described with reference to implementations discussed above, various changes, modifications and substitutes are can be made. Accordingly, it will be appreciated that in numerous instances some features of the invention can be employed without a corresponding use of other features. Further, variations can be made in the number and arrangement of components illustrated in the figures discussed above.

Claims

1. A method for processing a Near Field Communication (NFC) transaction using a mobile device, the method comprising:

detecting an inductive near field communication trigger from an NFC terminal when the mobile device is in close proximity to the NFC terminal which is configured to use a near field communications protocol, wherein the near field communication trigger is detected by an NFC transceiver associated with a secure element permanently embedded within the body of the mobile device, wherein, the mobile device comprises a mobile device display, a mobile device processor, a mobile device wireless interface that supports at least one of CDMA, GSM and wireless fidelity (Wi-Fi), and a mobile device memory which stores a non-browser based application, wherein the non-browser based application is a mobile operating system platform based mobile application with a graphical user interface that is preinstalled or downloaded and installed on the mobile device,
executing a payment application stored in a secure element memory, wherein the payment application is executed by a secure element processor in response to the near field communication trigger by the NFC terminal, the secure element memory and secure element processor included in the secure element, wherein the payment application is configured to use the NFC protocol;
transmitting, using the payment application, an identification code associated with a user from the secure element memory over a first communication channel to the NFC terminal, wherein the identification code associated with the user is transmitted over a second communication channel that is different than the first communication channel to a server for processing the NFC transaction using a payment method corresponding to the identification code associated with the user, wherein the payment method is maintained at the server, wherein the first communication channel is configured to use the NFC protocol;
after the NFC transaction has been processed, receiving over the second communication channel, a digital artifact at the non-browser based application on the mobile device from the server; and
displaying the digital artifact in the non-browser based application on the mobile device.

2. The method of claim 1, wherein the digital artifact is a coupon, ticket, or a receipt.

3. The method of claim 1, wherein the digital artifact is cached on the mobile device and accessed by the non-browser based application when the mobile device is not connected to a network.

4. The method of claim 3, further wherein upon the condition that the mobile device loses connection with a wireless network, the non-browser based application monitors for access to the wireless network and automatically reconnects to the wireless network when the wireless network is available.

5. The method of claim 1, further wherein the non-browser based application sends a request to the server to retransmit the digital artifact if it has not received the digital artifact within a certain period of time.

6. The method of claim 1, wherein the non-browser based application displays the digital artifact in a structured format and further wherein the structured format means the non-browser based application can store and display data in an organized and easily retrievable fashion.

7. The method of claim 1, wherein the non-browser based application uses a connection oriented protocol.

8. The method of claim 1, further wherein the server is configured to store a single identification code associated with the user for one or more of the user's mobile devices, and further wherein a configuration means the server scales.

9. The method of claim 1, further wherein a coupon is automatically applied during an NFC inductive interaction between the secure element and the NFC terminal.

10. The method of claim 1, wherein the payment method is a credit card, debit card, or cash card.

11. The method of claim 1, further wherein the digital artifact is based on the server correlating one or more of the identification code associated with the user, information related to the payment method, information related to the user, information related to the NFC transaction, and information related to a transaction history.

12. A mobile device for processing a Near Field Communication (NFC) transaction, the mobile device comprising:

a secure element permanently embedded in the body of the mobile device including: a near field communication transceiver configured to detect an inductive near field communication trigger from an NFC terminal when the mobile device is in close proximity to the NFC terminal which is configured for to use a near field communications protocol; and transmit, using a payment application, an identification code associated with a user from a secure element memory over a first communication channel to the NFC terminal, wherein the identification code associated with the user is transmitted over a second communication channel that is different than the first communication channel to a server for processing the NFC transaction using a payment method corresponding to the identification code associated with the user, wherein the payment method is maintained at the server, wherein the first communication channel is configured to use the NFC protocol; and a secure element processor configured to execute the payment application in response to the near field communication trigger by the NFC terminal, wherein the payment application is configured to use the NFC protocol,
a mobile device processor;
a mobile device wireless interface that supports at least one of CDMA, GSM and wireless fidelity (Wi-Fi) and further wherein after the NFC transaction has been processed, receives over the second communication channel, a digital artifact from the server;
a mobile device memory which stores a non-browser based application, wherein the non-browser based application is a mobile operating system platform based mobile application with a graphical user interface that is preinstalled or downloaded and installed on the mobile device; and
a mobile device display which displays the digital artifact in the non-browser based application running on the mobile device.

13. The mobile communications device of claim 12, wherein the digital artifact is a coupon, ticket, or receipt.

14. The mobile device of claim 12, wherein the digital artifact is cached on the mobile device and accessed by the non-browser based application when the mobile device is not connected to a network.

15. The mobile device of claim 14, further wherein upon the condition that the mobile device loses connection with a wireless network, the non-browser based application monitors for access to the wireless network and automatically reconnects to the wireless network when the wireless network is available.

16. The mobile device of claim 12, further wherein the non-browser based application sends a request to the server to retransmit the digital artifact if it has not received the digital artifact within a certain period of time.

17. The mobile device of claim 12, wherein the non-browser based application displays the digital artifact in a structured format and further wherein, the structured format means the non-browser based application can store and display data in an organized and easily retrievable fashion.

18. The mobile device of claim 12, wherein the non-browser based application uses a connection oriented protocol.

19. The mobile device of claim 12, further wherein the server is configured to store a single identification code associated with the user one or more of the user's mobile devices, and further wherein the configuration means the server scales.

20. The mobile device of claim 12, further wherein a coupon is automatically applied during an NFC inductive interaction between the secure element and the NFC terminal.

21. The mobile device of claim 12, wherein the payment method is a credit card, debit card, or cash card.

22. The mobile device of claim 12, further wherein the digital artifact is based on the server correlating one or more of the identification code associated with the user, information related to the payment method, information related to the user, information related to the NFC transaction, and information related to a transaction history.

Referenced Cited
U.S. Patent Documents
6038367 March 14, 2000 Abecassis
6101483 August 8, 2000 Petrovich
6115601 September 5, 2000 Ferreira
6123259 September 26, 2000 Ogasawara
6128655 October 3, 2000 Fields
6141666 October 31, 2000 Tobin
6199082 March 6, 2001 Ferrel
6250557 June 26, 2001 Forslund
6415156 July 2, 2002 Stadelmann
6450407 September 17, 2002 Freeman
6587835 July 1, 2003 Treyz
6605120 August 12, 2003 Fields
6771981 August 3, 2004 Zalewski
6772396 August 3, 2004 Cronin
6886017 April 26, 2005 Jackson
6950939 September 27, 2005 Tobin
7031945 April 18, 2006 Donner
7069001 June 27, 2006 Rupp
7069248 June 27, 2006 Huber
7096003 August 22, 2006 Joao
7110744 September 19, 2006 Freeny
7110792 September 19, 2006 Rosenberg
7127236 October 24, 2006 Khan
7200578 April 3, 2007 Paltenghe
7289810 October 30, 2007 Jagadeesan
7308254 December 11, 2007 Rissanen
7357312 April 15, 2008 Gangi
7379920 May 27, 2008 Leung
7392226 June 24, 2008 Sasaki
7454232 November 18, 2008 Abuhamdeh
7472829 January 6, 2009 Brown
7482925 January 27, 2009 Hammad
7512567 March 31, 2009 Bemmel
7520439 April 21, 2009 Gandel
7522905 April 21, 2009 Hammad
7543737 June 9, 2009 Bensimon
7734252 June 8, 2010 Mechaley
7784684 August 31, 2010 Labrou
7819321 October 26, 2010 Faith
7870077 January 11, 2011 Woo
7909243 March 22, 2011 Merkow
7979519 July 12, 2011 Shigeta
7991693 August 2, 2011 Scipioni
7991694 August 2, 2011 Takayama
8005426 August 23, 2011 Huomo
8019362 September 13, 2011 Sweatman
8019365 September 13, 2011 Fisher
8073424 December 6, 2011 Sun
8086534 December 27, 2011 Powell
8109444 February 7, 2012 Jain
8116734 February 14, 2012 Vawter
8121945 February 21, 2012 Rackley
8127984 March 6, 2012 Zatloukal
8190087 May 29, 2012 Fisher
8275312 September 25, 2012 Fisher
9294917 March 22, 2016 Nystrom
10902399 January 26, 2021 Fisher
20010011250 August 2, 2001 Paltenghe
20010044751 November 22, 2001 Pugliese
20020056091 May 9, 2002 Bala
20020059100 May 16, 2002 Shore
20020063895 May 30, 2002 Agata
20020065774 May 30, 2002 Young
20020077918 June 20, 2002 Lerner
20020082879 June 27, 2002 Miller
20020107010 August 8, 2002 Witte
20020107756 August 8, 2002 Hammons
20020160761 October 31, 2002 Wolfe
20020169984 November 14, 2002 Kumar
20030055792 March 20, 2003 Kinoshita
20030061113 March 27, 2003 Petrovich
20030065805 April 3, 2003 Barnes
20030074259 April 17, 2003 Slyman
20030085286 May 8, 2003 Kelley
20030087601 May 8, 2003 Agam
20030093695 May 15, 2003 Dutta
20030105641 June 5, 2003 Lewis
20030132298 July 17, 2003 Swartz
20030140004 July 24, 2003 O'Leary
20030163359 August 28, 2003 Kanesaka
20030172028 September 11, 2003 Abell
20040006497 January 8, 2004 Nestor
20040030658 February 12, 2004 Cruz
20040034544 February 19, 2004 Fields
20040064408 April 1, 2004 Kight
20040073497 April 15, 2004 Hayes
20040127256 July 1, 2004 Goldthwaite
20040235450 November 25, 2004 Rosenberg
20040243519 December 2, 2004 Perttila
20040254836 December 16, 2004 Emoke Barabas
20040267618 December 30, 2004 Judicibus
20040267665 December 30, 2004 Nam
20040267667 December 30, 2004 Ohara
20050003810 January 6, 2005 Chu
20050040230 February 24, 2005 Swartz
20050076210 April 7, 2005 Thomas
20050165646 July 28, 2005 Tedesco
20050177442 August 11, 2005 Sullivan
20050187873 August 25, 2005 Labrou
20050215231 September 29, 2005 Bauchot
20050251440 November 10, 2005 Bednarek
20050258245 November 24, 2005 Bates
20060000900 January 5, 2006 Fernandes
20060015404 January 19, 2006 Tran
20060031752 February 9, 2006 Surloff
20060065741 March 30, 2006 Vayssiere
20060080232 April 13, 2006 Epps
20060089874 April 27, 2006 Newman
20060143091 June 29, 2006 Yuan
20060191995 August 31, 2006 Stewart
20060206709 September 14, 2006 Labrou
20060219780 October 5, 2006 Swartz
20070004391 January 4, 2007 Maffeis
20070011099 January 11, 2007 Sheehan
20070022058 January 25, 2007 Labrou
20070078722 April 5, 2007 Saxena
20070095892 May 3, 2007 Lyons
20070108269 May 17, 2007 Benco
20070125838 June 7, 2007 Law
20070125840 June 7, 2007 Law
20070138299 June 21, 2007 Mitra
20070131759 June 14, 2007 Cox
20070152035 July 5, 2007 Adams
20070156436 July 5, 2007 Fisher
20070162381 July 12, 2007 Petralia
20070210155 September 13, 2007 Swartz
20070235519 October 11, 2007 Jang
20070235539 October 11, 2007 Sevanto
20070255662 November 1, 2007 Tumminaro
20070262139 November 15, 2007 Fiebiger
20070270166 November 22, 2007 Hampel
20070293155 December 20, 2007 Liao
20080010190 January 10, 2008 Rackley
20080010196 January 10, 2008 Rackley
20080017704 January 24, 2008 Vandeburg
20080294556 November 27, 2008 Anderson
20080045172 February 21, 2008 Narayanaswami
20080046366 February 21, 2008 Bemmel
20080048022 February 28, 2008 Vawter
20080051059 February 28, 2008 Fisher
20080051142 February 28, 2008 Calvet
20080052192 February 28, 2008 Fisher
20080052233 February 28, 2008 Fisher
20080139155 June 12, 2008 Boireau
20080167966 July 10, 2008 Ramsdale
20080167988 July 10, 2008 Sun
20080177668 July 24, 2008 Delean
20080208681 August 28, 2008 Hammad
20080208743 August 28, 2008 Arthur
20080208744 August 28, 2008 Arthur
20080208762 August 28, 2008 Arthur
20080221997 September 11, 2008 Wolfe
20080255947 October 16, 2008 Friedman
20080275779 November 6, 2008 Lakshminarayanan
20080305774 December 11, 2008 Ramakrishna
20080314994 December 25, 2008 Faith
20090063312 March 5, 2009 Hurst
20090069050 March 12, 2009 Jain
20090075592 March 19, 2009 Nystrom
20090098825 April 16, 2009 Huomo
20090099961 April 16, 2009 Ogilvy
20090104888 April 23, 2009 Cox
20090106112 April 23, 2009 Dalmia
20090124234 May 14, 2009 Fisher
20090132362 May 21, 2009 Fisher
20090143104 June 4, 2009 Loh
20090144161 June 4, 2009 Fisher
20090222358 September 3, 2009 Bednarek
20090227281 September 10, 2009 Hammad
20100057619 March 4, 2010 Weller
20100063895 March 11, 2010 Dominguez
20100148928 June 17, 2010 Yeager
20100320266 December 23, 2010 White
20110264543 October 27, 2011 Taveau
20110278361 November 17, 2011 Heusmann
20110320316 December 29, 2011 Randazza
20120016793 January 19, 2012 Peters
20150012440 January 8, 2015 Kelley
Foreign Patent Documents
WO 2006095212 September 2006 WO
Other references
  • U.S. Appl. No. 11/933,337, Office Action dated May 27, 2010, 9 p.
  • U.S. Appl. No. 11/933,351, Office Action dated Oct. 3, 2008, 5 p.
  • U.S. Appl. No. 11/933,367, Office Action dated May 27, 2010, 8 p.
  • U.S. Appl. No. 11/948,903, Office Action dated Feb. 2, 2009, 11 p.
  • U.S. Appl. No. 11/467,441, Office Action dated May 27, 2009, 17 p.
  • U.S. Appl. No. 12/592,581, Office Action dated Jun. 4, 2010, 20 p.
  • U.S. Appl. No. 11/933,351, Office Action dated Jul. 8, 2009, 7 p.
  • U.S. Appl. No. 11/939,821, Office Action dated Aug. 17, 2010, 11 p.
  • U.S. Appl. No. 11/948,903, Office Action dated Nov. 12, 2009, 14 p.
  • U.S. Appl. No. 11/933,351, Office Action dated Aug. 18, 2010, 16 p.
  • U.S. Appl. No. 12/592,581, Final Office Action dated Jul. 20, 2017, 16 p.
  • U.S. Appl. No. 12/592,581, Appeal Decision mailed Nov. 1, 2016, 15 p.
  • U.S. Appl. No. 14/627,969, Final Office Action dated Dec. 1, 17, 13 p.
  • U.S. Appl. No. 14/686,695 Notice of Allowance dated Oct. 12, 2017 11 p.
  • U.S. Appl. No. 14/867,838 Final Office Action dated Dec. 28, 2017 13p.
  • “Triple Des” https://en.wikipedia.org/wiki/Triple_DES.
  • “Public key” https://en.wikipedia.org/wiki/Pubiic-key_cryptography.
  • “Credit Card”—https://en.wikipedia.org/wiki/Credit_card.
  • “Payment card number” https://en.wikipedia.org/wiki/Payment_card_number.
  • “Credi Card Fraud”—https://en.m.wikipedia.org/wiki/Credit_card_fraud.
  • “Issuing Bank”—https://en.wikipedia.org/wiki/Issuing_bank.
  • “Acquiring Bank”—https://en.wikipedia.org/wiki/Acquiring_bank.
  • “Text Messaging”—https://en.m.wikipedia.org/wiki/Text_messaging.
  • “Graphical User Interface”—https://en.m.wikipedia.org/wiki/Graphical_user_interface.
  • “Web Browser”—https://techterms.com/definition/web_browser.
  • “Java Script”—https://techterms.co_m/definition/javascript.
  • “MasterCard Pay Pass” 1739369(MasterCard_PayPass).pdf.
  • Is near-field communication close to success?—https://ieeexplere.ieee.org/document/1607943?arnumber=1607943.
  • “Room6_150pm_munro.pdf”—http://www.rfidjournal.net/live05/monday/.
Patent History
Patent number: 11080673
Type: Grant
Filed: Aug 24, 2012
Date of Patent: Aug 3, 2021
Patent Publication Number: 20130018740
Assignee: (Berkeley, CA)
Inventor: Michelle Fisher (Oakland, CA)
Primary Examiner: Steven S Kelley
Application Number: 13/594,049
Classifications
Current U.S. Class: Cellular Telephone Cryptographic Authentication (380/247)
International Classification: G06Q 20/20 (20120101); G06Q 20/32 (20120101); G06Q 20/42 (20120101); H04W 4/02 (20180101); H04M 11/00 (20060101); G06Q 30/06 (20120101); H04W 4/50 (20180101); H04W 4/80 (20180101); H04M 1/72412 (20210101); H04M 1/67 (20060101);